• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

3791 Engineer courses delivered Online

Networking in Google Cloud

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This class is intended for network engineers and network admins that are either using Google Cloud Platform or are planning to do so. The class is also for individuals that want to be exposed to software-defined networking solutions in the cloud. Overview Configure Google VPC networks, subnets, and routers Control administrative access to VPC objects Control network access to endpoints in VPCsInterconnect networks among GCP projects Interconnect networks among GCP VPC networks and on-premises or other-cloud networks Choose among GCP load balancer and proxy options and configure them Use Cloud CDN to reduce latency and save money Optimize network spend using Network TiersConfigure Cloud NAT or Private Google Access to provide instances without public IP addresses access to other services Deploy networks declaratively using Cloud Deployment Manager or Terraform Design networks to meet common customer requirements Configure monitoring and logging to troubleshoot networks problems Learn about the broad variety of networking options on Google Cloud. This course uses lectures, demos, and hands-on labs to help you explore and deploy Google Cloud networking technologies, including Virtual Private Cloud (VPC) networks, subnets, and firewalls; interconnection among networks; load balancing; Cloud DNS; Cloud CDN; and Cloud NAT. You'll also learn about common network design patterns and automated deployment using Cloud Deployment Manager or Terraform. Google Cloud VPC Networking Fundamentals Recall that networks belong to projects. Explain the differences among default, auto, and custom networks. Create networks and subnets. Explain how IPv4 addresses are assigned to Compute Engine instances. Publish domain names using Google Cloud DNS. Create Compute Engine instances with IP aliases. Create Compute Engine instances with multiple virtual network. Controlling Access to VPC Networks Outline how IAM policies affect VPC networks. Control access to network resources using service accounts. Control access to Compute Engine instances with tag-based firewall rules. Sharing Networks across Projects Outline the overall workflow for configuring Shared VPC. Differentiate between the IAM roles that allow network resources to be managed. Configure peering between unrelated VPC Networks. Recall when to use Shared VPC and when to use VPC Network Peering. Load Balancing Recall the various load balancing services. Configure Layer 7 HTTP(S) load balancing. Whitelist and blacklist IP traffic with Cloud Armor. Cache content with Cloud CDN. Explain Layer 4 TCP or SSL proxy load balancing. Explain regional network load balancing. Configure internal load balancing. Recall the choices for enabling IPv6 Internet connectivity for Google Cloud load balancers. Determine which Google Cloud load balancer to use when. Hybrid Connectivity Recall the Google Cloud interconnect and peering services available to connect your infrastructure to Google Cloud. Explain Dedicated Interconnect and Partner Interconnect. Describe the workflow for configuring a Dedicated Interconnect. Build a connection over a VPN with Cloud Router. Determine which Google Cloud interconnect service to use when. Explain Direct Peering and Partner Peering. Determine which Google Cloud peering service to use when. Networking Pricing and Billing Recognize how networking features are charged for. Use Network Service Tiers to optimize spend. Determine which Network Service Tier to use when. Recall that labels can be used to understand networking spend. Network Design and Deployment Explain common network design patterns. Configure Private Google Access to allow access to certain Google Cloud services from VM instances with only internal IP addresses. Configure Cloud NAT to provide your instances without public IP addresses access to the internet. Automate the deployment of networks using Deployment Manager or Terraform. Launch networking solutions using Cloud Marketplace. Network Monitoring and Troubleshooting Configure uptime checks, alerting policies and charts for your network services. Use VPC Flow Logs to log and analyze network traffic behavior.

Networking in Google Cloud
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Designing the FlexPod Solution (FPDESIGN)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This course is designed for post-sales audiences and is aimed at channel partners, customer network engineers and administrators whose interest is focused around designing a scalable infrastructure with the FlexPod. Overview Upon completing this course, you will be able to meet these overall objectives: Describe the FlexPod data center solutions and architecture Identify FlexPod workload sizing and technical specifications Describe the FlexPod deployment and management strategies The goal of this course is to evaluate the FlexPod solution design process in regards to the contemporary data center challenges. The course provides a comprehensive understanding of the reconnaissance and analytics to assess computing solution performance characteristics and requirements. In addition this course will describe the hardware components of the FlexPod and the process for selecting proper hardware for a given set of requirements. FlexPod Data Center Solutions and Architecture Describe data center elements Identify data center business challenges Identify data center environmental challenges Identify data center technical challenges Describe the data center consolidation trend Describe the FlexPod solution Identify the benefits of FlexPod Describe FlexPod platforms Describe FlexPod validated and supported designs Identify the supported Cisco UCS components Identify the supported Cisco Nexus switch components Identify the supported NetApp storage components FlexPod Workload Sizing and Technical Specifications Describe FlexPod performance characteristics Describe server virtualization performance characteristics Describe desktop virtualization performance characteristics Describe reconnaissance and analysis tools Describe the process for deploying analysis tools Configure the Microsoft MAP Toolkit Identify FlexPod Design components Describe FlexPod Sizing considerations Employ Cisco UCS Application Sizer Employ Cisco UCS VXI Resource Comparison tool Describe NetApp Solution Builder Sizing tool FlexPod Deployment and Management Strategies Describe key FlexPod LAN features Describe key FlexPod SAN features Identify FlexPod server provisioning features List FlexPod high availability features Describe supported FlexPod SAN features Describe FlexPod virtual storage tiering features Identify Cisco FlexPod validated designs Identify FlexPod data center with VMware vSphere 5.1 Identify FlexPod data center with VMware vSphere 5.1 with Cisco Nexus 7000 Identify FlexPod data center with Microsoft Private Cloud Enterprise Design Guide Identify FlexPod Select with Cloudera's Distribution including Apache Hadoop (CDH) Identify FlexPod Cisco Nexus 7000 and NetApp MetroCluster for multisite deployment Identify data center operations and management challenges Describe FlexPod validated management solutions Describe Cisco UCS Director turnkey solutions Identify Cisco UCS Director management types Describe Cisco UCS Director automation Describe self-service provisioning and reporting Identify the customer challenges and goals Describe the workload analysis Describe the component selection process Review the selected component Analyze the solution Additional course details: Nexus Humans Cisco Designing the FlexPod Solution (FPDESIGN) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Designing the FlexPod Solution (FPDESIGN) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Designing the FlexPod Solution (FPDESIGN)
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vSphere: Optimize and Scale [v7.0]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced system administrators, system engineers, and system integrators Overview By the end of the course, you should be able to meet the following objectives: Configure and manage vSphere networking and storage for a large and sophisticated enterprise Use VMware vSphere Client™ to manage certificates Use Identity Federation to configure VMware vCenter Server to use external identity sources Use VMware vSphere Trust Authority™ to secure the infrastructure for encrypted VMs Use host profiles to manage VMware ESXi™ host compliance Create and manage a content library for deploying virtual machines Manage VM resource usage with resource pools Monitor and analyze key performance indicators for compute, storage, and networking resources for ESXi hosts Optimize the performance in the vSphere environment, including vCenter Server This five-day course teaches you advanced skills for configuring and maintaining a highly available and scalable virtual infrastructure. Through a mix of lecture and hands-on labs, you configure and optimize the VMware vSphere© 7 features that build a foundation for a truly scalable infrastructure, and you discuss when and where these features have the greatest effect. Attend this course to deepen your understanding of vSphere and learn how its advanced features and controls can benefit your organization. As an exclusive benefit, those who participate in this course will receive additional premium recorded lecture material on vSphere security. Course Introduction Introductions and course logistics Course objectives Network Scalability Configure and manage vSphere distributed switches Describe how VMware vSphere© Network I/O Control enhances performance Explain distributed switch features such as port mirroring and NetFlow Storage Scalability Explain why VMware vSphere© VMFS is a high-performance, scalable file system Explain VMware vSphere© Storage APIs - Array Integration, VMware vSphere© API for Storage Awareness?, and vSphere APIs for I/O filtering Configure and assign virtual machine storage policies Create VMware vSAN? storage policies Recognize components of the VMware vSphere© Virtual Volumes? architecture Configure VMware vSphere© Storage DRS? and VMware vSphere© Storage I/O Control Host and Management Scalability Use the vSphere Client to manage vSphere certificates Describe identity federation and recognize its use cases Configure identity federation to allow vCenter Server to use external identity provider Describe the benefits and use cases of vSphere Trust Authority Configure vSphere Trust Authority Use host profiles to manage ESXi configuration compliance Create a local content library and subscribe to a published content library Deploy VMs from a content library Create and manage resource pools in a cluster Describe how scalable shares work CPU Optimization Explain the CPU scheduler operation and other features that affect CPU performance Explain NUMA and vNUMA support Use esxtop to monitor key CPU performance metrics Memory Optimization Explain ballooning, memory compression, transparent page sharing, and host-swapping techniques for memory reclamation when memory is overcommitted Use esxtop to monitor key memory performance metrics Storage Optimization Describe storage queue types and other factors that affect storage performance Discuss vSphere support for NVMe and iSER technologies Use esxtop to monitor key storage performance metrics Network Optimization Explain performance features of network adapters Explain the performance features of vSphere networking Use esxtop to monitor key network performance metrics vCenter Server Performance Optimization Describe the factors that influence vCenter Server performance Use VMware vCenter© Server Appliance? tools to monitor resource use Supplemental Content Appendix A: vSphere Auto Deploy Explain the purpose of VMware vSphere© ESXi ? Image Builder CLI Explain the purpose of VMware vSphere© Auto Deploy? Describe how an autodeployed ESXi host boots Configure a vSphere Auto Deploy environment Appendix B: vSphere Security Configure ESXi Host Access and Authentication Recognize strategies for securing vSphere components, such as vCenter Server, ESXi hosts, and virtual machines Describe vSphere support for security standards and protocols Describe virtual machine security features Describe the components of a VM encryption architecture Create, manage, and migrate encrypted VMs Encrypt core dumps List VM encryption events and alarms

VMware vSphere: Optimize and Scale [v7.0]
Delivered OnlineFlexible Dates
Price on Enquiry

VMware vSphere 6.5 Optimize and Upgrade

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Experienced system administrators, system engineers, and system integrators. Overview Configure and manage VMware ESXi? networking and storage for a large and sophisticated enterprise Use VMware vSphere© Client?, VMware vSphere© Web Client, and VMware vSphere© ESXi? Shell to manage vSphere Use VMware vSphere© Auto Deploy? and host profiles to provision ESXi hosts Optimize the performance of all vSphere components Use VMware vRealize© Log Insight? to monitor system logs Deploy VMware vCenter© Server Appliance? to be highly available and optimized for performance Migrate a Windows vCenter Server system to vCenter Server Appliance 6.5 Harden the vSphere environment against security threats Encrypt virtual machines for additional security This advanced course provides students with advanced knowledge of configuring and operating a highly available and scalable virtual infrastructure. Course Introduction Introductions and course logistics Course objectives Identify additional resources for after this course Identify other VMware Education offerings Describe the user interfaces available in vSphere 6.5 Network Scalability Configure and manage vSphere distributed switches Explain distributed switch features such as port mirroring, LACP, QoS tagging, and NetFlow Storage Scalability Explain VMware vSphere© Storage APIs - Array Integration and VMware vSphere© API for Storage Awareness? Configure and assign virtual machine storage policies Configure VMware vSphere© Storage DRS? and VMware vSphere© Storage I/O Control Create and use virtual volumes in vSphere Host and Management Scalability Explain the uses of VMware vCenter© Converter? Define and use content libraries Describe and use host profiles Describe and use VMware vSphere© ESXi? Image Builder CLI and vSphere Auto Deploy CPU Optimization Explain the CPU scheduler operation, NUMA support, and other features that affect CPU performance Use esxtop to monitor key CPU performance metrics Memory Optimization Explain ballooning, memory compression, and host-swapping techniques for memory reclamation when memory is overcommitted Use esxtop to monitor key memory performance metrics Storage Optimization Describe storage queue types and other factors that affect storage performance Use esxtop to monitor key storage performance metrics 8 Network Optimization Network Optimization Explain the performance features of network adapters Explain the performance features of vSphere networking Use esxtop to monitor key network performance metrics Analyzing vSphere Explain how Proactive DRS enhances virtual machine availability Use vRealize Log Insight to identify and troubleshoot issues vCenter Server Availability and Performance Describe the high availability options for vCenter Server and VMware Platform Services Controller? Describe and use VMware vCenter Server© High Availability Identify the factors that influence vCenter Server performance Migrate a Windows vCenter Server 5.5 system to vCenter Server Appliance 6.5 vSphere Security Configure ESXi host access and authorization Secure ESXi, vCenter Server, and virtual machines Use VMware Certificate Authority to configure vSphere certificate management Configure vSphere to encrypt virtual machines, core dumps Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware vSphere 6.5 Optimize and Upgrade training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware vSphere 6.5 Optimize and Upgrade course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

VMware vSphere 6.5 Optimize and Upgrade
Delivered OnlineFlexible Dates
Price on Enquiry

CertNexus Certified Ethical Emerging Technologist (CEET) v1.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for technology leaders, solution developers, project managers, organizational decision makers, and other individuals seeking to demonstrate a vendor-neutral, cross-industry understanding of ethics in emerging data-driven technologies, such as AI, robotics, IoT, and data science. This course is also designed for professionals who want to pursue the CertNexus Certification Exam CET-110: Certified Ethical Emerging Technologies. Overview In this course, you will incorporate ethics into data-driven technologies such as AI, IoT, and data science. You will: Describe general concepts, theories, and challenges related to ethics and emerging technologies. Identify ethical risks. Practice ethical reasoning. Identify and mitigate safety and security risks. Identify and mitigate privacy risks. Identify and mitigate fairness and bias risks. Identify and mitigate transparency and explainability risks. Identify and mitigate accountability risks. Build an ethical organization. Develop ethical systems in technology-focused organizations. Mutually reinforcing innovations in computing and engineering are catapulting advances in technological production. From blockchain and artificial intelligence (AI) to gene editing and the Internet of Things (IoT), these advances come with tremendous opportunities for improvement in productivity, efficiency, and human well-being. But as scandals increasingly demonstrate, these advances also introduce new and serious risks of conflict and harm.Technology professionals now face growing demands to identify and mitigate ethical risks to human rights and the environment, as well as to navigate ethical tradeoffs between qualities such as privacy and accuracy, fairness and utility, and safety and accountability. This course provides the tools to identify and manage common ethical risks in the development of emerging data-driven technologies. It distills ethical theory, public regulations, and industry best practices into concrete skills and guidelines needed for the responsible development of digital products and services. By following the course's practical, problems-based approach, learners will become adept at applying theories, principles, frameworks, and techniques in their own roles and organizations. Introduction to Ethics of Emerging Technologies Topic A: What?s at Stake Topic B: Ethics and Why It Matters Topic C: Ethical Decision-Making in Practice Topic D: Causes of Ethical Failures Identifying Ethical Risks Topic A: Ethical Reasons Topic B: Stumbling Blocks for Ethical Reasoning Topic C: Identify Ethical Risks in Product Development Topic D: Tools for Identifying Ethical Risks Topic E: Use Regulations, Standards, and Human Rights to Identify Ethical Risks Ethical Reasoning in Practice Topic A: Ethical Theories Topic B: Use Ethical Decision-Making Frameworks Topic C: Select Options for Action Topic D: Avoid Problems in Ethical Decision-Making Identifying and Mitigating Security Risks Topic A: What Is Security? Topic B: Identify Security Risks Topic C: Security Tradeoffs Topic D: Mitigate Security Risks Identifying and Mitigating Privacy Risks Topic A: What Is Privacy? Topic B: Identify Privacy Risks Topic C: Privacy Tradeoffs Topic D: Mitigate Privacy Risks Identifying and Mitigating Fairness and Bias Risks Topic A: What Are Fairness and Bias? Topic B: Identify Bias Risks Topic C: Fairness Tradeoffs Topic D: Mitigate Bias Risks Identifying and Mitigating Transparency and Explainability Risks Topic A: What Are Transparency and Explainability? Topic B: Identify Transparency and Explainability Risks Topic C: Transparency and Explainability Tradeoffs Topic D: Mitigate Transparency and Explainability Risks Identifying and Mitigating Accountability Risks Topic A: What Is Accountability? Topic B: Identify Accountability Risks Topic C: Accountability Tradeoffs Topic D: Mitigate Accountability Risks Building an Ethical Organization Topic A: What Are Ethical Organizations? Topic B: Organizational Purpose Topic C: Ethics Awareness Topic D: Develop Professional Ethics within Organizations Developing Ethical Systems in Technology-Focused Organizations Topic A: Policy and Compliance Topic B: Metrics and Monitoring Topic C: Communication and Stakeholder Engagement Topic D: Ethical Leadership

CertNexus Certified Ethical Emerging Technologist (CEET) v1.0
Delivered OnlineFlexible Dates
Price on Enquiry

BA20 - Business Process Improvement

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for It is appropriate for Managers, Executives, Project Managers, Business Analysts, Business and IT stakeholders working with analysts, Quality and process engineers, technicians, managers; supervisors, team leaders, and process operators. Overview Describe business process improvement (BPI) business drivers.Plan, manage and close requirements for a Business Process Improvement project Understand the essential elements of a successful BPI initiative.Identify candidate business processes for improvement.Understand the essential elements of a successful BPI initiative.Identify candidate business processes for improvement.Apply a methodology to business process improvement projects. This 2-day course aims at introducing its attendees to the core values, principles, and practices of Business Process Improvement. Introduction - A Business Process Improvement (BPI) Overview Why are we here today? What is BPI? Benefits of BPI Specific challenges/obstacles and successes Process improvement examples: Industry specific examples Famous debacles to avoid and successes to emulate Your role in helping to identify problems Overview of the Joiner 7-Step Method What is the Joiner 7-Step Method? Walkthrough of the Joiner 7-Step Method Template: Introduce and review Process Improvement Template Case Study Exercise: Read and discuss introduction to the Case Study Step #1: Initiate the Project Types of business problems typically encountered at insurance companies and banks How to recognize a business-related problem Identifying the gaps (delta between current and future states) Ownership of the project and the business problem Defining measurable success criteria Case Study Exercise: Complete the Problem Statement section (Step #1) of the template Step #2: Define Current Situation What are symptoms of a problem? Looking for symptoms of the problem Performing Stakeholder Analysis Technique: View a RACI Matrix Defining the impacts caused by the problem Technique: Business Process Modeling (As-Is) Understand how to draw an As-Is Business Process Model Case Study Exercise: Complete the Define Current Situation section (Step #2) of the template Step #3: Identify Root Causes What are root causes? Performing Root Cause Analysis Technique: Fishbone Diagram using the cafeteria example Case Study Exercise: Discuss a Fishbone Diagram Technique: Pareto Chart (discuss and show example) Case Study Exercise: Complete the Identify Root Causes section (Step #3) of the template Step #4: Develop Solutions Identifying options for problem resolution Avoid jumping to conclusions Technique: Brainstorming Case Study Exercise: Conduct a Brainstorming Session Recognizing pros and cons for each option Technique: Kempner-Tregoe (?Must-Have? vs. ?Nice-to-Have?) Case Study Exercise: Determine best solution using a ?simple? Kempner-Tregoe model Case Study Exercise: Complete the Develop Solutions section (Step #4) of the template Step #5: Define Measurable Results Prototyping the solution Technique: Business Process Modeling (To-Be) Measuring results against the success criteria (Step #1) Case Study Exercise: Review changes to an As-Is Business Process Model Case Study Exercise: Complete the Define Measurable Results section (Step #5) of the template Step #6: Standardize Process Defining how the process will be documented Plan and understand organizational readiness Discuss how employees are empowered to identify and act upon their ideas Identifying follow-up needs (i.e., training) for the staff that will be impacted Technique: Communication Plan Case Study Exercise: Complete the Standardize Process section (Step #6) of the template Step #7: Determine Future Plans Monitoring the process for Continuous Process Improvement (The ?Plan-Do-Check-Act? Cycle) Understand how to sustain the improvements made by the Joiner 7-Step Method Technique: PDCA form Case Study Exercise: Complete the Determine Future Plans section (Step #7) of the template Going Forward with a Plan of Action Identifying process problems in your organization Individual Exercise: Name three (3) possible areas for improvement Prioritize and define the next steps Individual Exercise: Using a new template complete Step 2 & Step 3 for one possible area for improvement you have identified

BA20 - Business Process Improvement
Delivered OnlineFlexible Dates
Price on Enquiry

IJSEC - Introduction to Juniper Security

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Operators of Juniper Networks security solutions, including network engineers, administrators, support personnel, and resellers. Overview Identify high-level security challenges in today's networks. Identify products that are incorporated into the Juniper Connected Security solution. Explain the value of implementing security solutions. Explain how Juniper Connected Security solves the cyber security challenges of the future. Explain the SRX Series devices and the added capabilities that next-generation firewalls provide. Explain traffic flows through the SRX Series devices. List the different security objects and how to create them. Describe interface types and perform basic interface configuration tasks. Describe the initial configuration for an SRX Series device. Explain security zones. Describe screens and their use. Explain address objects. Describe services and their use. Describe the purpose for security policies on an SRX Series device. Describe zone-based policies. Describe global policies and their use. Explain unified security policies. Configure unified security policies with the J-Web user interface. Describe IDP signatures. Configure an IDP policy using predefined templates with the J-Web user interface. Describe the use and configuration of the integrated user firewall feature. Describe the UTM security services List the available UTM services on the SRX Series device. Configure UTM filtering on a security policy with the J-Web user interface. Explain Sky ATP's use in security. Describe how Sky ATP and SRX Series devices operate together in blocking threats. Describe NAT and why it is used. Explain source NAT and when to use it. Explain destination NAT and when to use it. Explain static NAT and its uses. Describe the operation and configuration the different types of NAT. Identify various types of VPNs. Describe IPsec VPNs and their functionality. Describe how IPsec VPNs are established. Describe IPsec traffic processing. Configure IPsec VPNs with the J-Web user interface. Describe and configure proxy IDs and traffic selectors with the J-Web user interface. Monitor IPsec VPNs with the J-Web user interface. Describe the J-Web monitoring features. Explain the J-Web reporting features. Describe the Sky Enterprise service and how it can save resources. Explain the functionality of Junos Space Security Director. This course is designed to provide students with the foundational knowledge required to work with SRX Series devices. This course will use the J-Web user interface to introduce students to the Junos operating system. Module 1: COURSE INTRODUCTION COURSE INTRODUCTION Module 2: Juniper Security Concept Security Challenges Security Design Overview Juniper Connected Security Module 3: Juniper Connected Security ? SRX Series Devices Connected Security Interfaces Initial Configuration LAB 1: Initial Configuration Module 4: Security Objects Security Zone Objects Security Screen Objects Security Address Objects Security Services Objects LAB 2: Creating Security Objects with J-Web Module 5: Security Policies Security Policy Overview Zone-Based Policies Global Security Policies Application Firewall with Unified Security Policies LAB 3: Creating Security Policies with J-Web Module 6: Security Services ? IDP and User Firewall IDP Security Services Integrated User Firewall LAB 4: Adding IDP and User Firewall Security Services to Security Policies Module 7: Security Services ? UTM Content Filtering Web Filtering Antivirus Antispam LAB 5: Adding UTM Security Services to Security Policies Module 8: Juniper Connected Security ? Sky AT Sky ATP Overview Blocking Threats Lab 6: Demonstrating Sky ATP Module 9: Network Address Translation NAT Overview Source NAT Destination NAT Static NAT Lab 7: Implementing Network Address Translation Module 10: IPsec VPN Concepts VPN Types Secure VPN Requirements IPsec Tunnel Establishment IPsec Traffic Processing Module 11: Site-to-Site VPNs IPsec Configuration IPsec Site-to-Site Tunne Lab 8: Implementing Site-to-Site IPsec VPNs Module 12: Monitoring and Reporting J-Web monitoring options J-Web Reporting options Lab 9: Using Monitoring and Reporting Appendix A: SRX Series Hardware Appendix D: Sky Enterprise Services Appendix B: Virtual SRX Appendix EJunos Space Security Director Appendix CCLI Prime

IJSEC - Introduction to Juniper Security
Delivered OnlineFlexible Dates
Price on Enquiry

Architecting with Google Compute Engine

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Cloud Solutions Architects, DevOps Engineers. Individuals using Google Cloud Platform to create new solutions or to integrate existing systems, application environments, and infrastructure with a focus on Google Compute Engine. Overview Configure VPC networks and virtual machines Administer Identity and Access Management for resources Implement data storage services in GCP Manage and examine billing of GCP resources Monitor resources using Stackdriver services Connect your infrastructure to GCP Configure load balancers and autoscaling for VM instances Automate the deployment of GCP infrastructure services Leverage managed services in GCP This class introduces participants to the comprehensive and flexible infrastructure and platform services provided by Google Cloud Platform, with a focus on Compute Engine. Through a combination of presentations, demos, and hands-on labs, participants explore and deploy solution elements, including infrastructure components such as networks, systems, and application services. This course also covers deploying practical solutions including securely interconnecting networks, customer-supplied encryption keys, security and access management, quotas and billing, and resource monitoring. Introduction to Google Cloud Platform List the different ways of interacting with GCP Use the GCP Console and Cloud Shell Create Cloud Storage buckets Use the GCP Marketplace to deploy solutions Virtual Networks List the VPC objects in GCP Differentiate between the different types of VPC networks Implement VPC networks and firewall rules Design a maintenance server Virtual Machines Recall the CPU and memory options for virtual machines Describe the disk options for virtual machines Explain VM pricing and discounts Use Compute Engine to create and customize VM instances Cloud IAM Describe the Cloud IAM resource hierarchy Explain the different types of IAM roles Recall the different types of IAM members Implement access control for resources using Cloud IAM Storage and Database Services Differentiate between Cloud Storage, Cloud SQL, Cloud Spanner, Cloud Firestore and Cloud Bigtable Choose a data storage service based on your requirements Implement data storage services Resource Management Describe the cloud resource manager hierarchy Recognize how quotas protect GCP customers Use labels to organize resources Explain the behavior of budget alerts in GCP Examine billing data with BigQuery Resource Monitoring Describe the Stackdriver services for monitoring, logging, error reporting, tracing, and debugging Create charts, alerts, and uptime checks for resources with Stackdriver Monitoring Use Stackdriver Debugger to identify and fix errors Interconnecting Networks Recall the GCP interconnect and peering services available to connect your infrastructure to GCP Determine which GCP interconnect or peering service to use in specific circumstances Create and configure VPN gateways Recall when to use Shared VPC and when to use VPC Network Peering Load Balancing and Autoscaling Recall the various load balancing services Determine which GCP load balancer to use in specific circumstances Describe autoscaling behavior Configure load balancers and autoscaling Infrastructure Automation Automate the deployment of GCP services using Deployment Manager or Terraform Outline the GCP Marketplace Managed Services Describe the managed services for data processing in GCP Additional course details: Nexus Humans Architecting with Google Compute Engine training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Architecting with Google Compute Engine course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Architecting with Google Compute Engine
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Implementing Cisco Catalyst 9000 Series Switches v3.0 (ENC9K)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Network designers Network managers System engineers Overview After taking this course, you should be able to: Review the Cisco Catalyst 9000 Series Switches identify the switches' features and examine the functionalities purpose-built for Cisco DNA and the SD-Access solution. Describe the Cisco Catalyst 9200 Series Switch architecture, model types, port types, uplink modules, components including power supplies, and other switch features and capabilities. Describe the Cisco Catalyst 9300 Series Switch architecture, model types, port types, uplink modules, and components, including power supplies and stacking cables. Describe the Cisco Catalyst 9400 Series Switches, different modular chassis, supervisor and line card options, architectural components, uplink, and power redundancy, and Multigigabit ports Describe the Cisco Catalyst 9500 Series Switches, model types, switch components, RFID support, architecture, and switch profiles. Describe the Cisco Catalyst 9600 Series Switch architecture, supervisor and line card options, and high availability features. Position the different Cisco Catalyst 9000 Series Switch model types in the network, and map older Cisco Catalyst switches to the 9000 family for migration. Examine management capabilities of the Cisco Catalyst 9000 Series Switches. Describe the Cisco Catalyst 9000 Series Switches deployed in a Cisco StackWise Virtual environment and an SD-Access fabric. Describe the new Cisco IOS XE software management, patchability, and Graceful Insertion and Removal (GIR) features on the Cisco Catalyst 9000 Series Switches. Describe the ThousandEyes Enterprise Agent using the Docker environment on the Cisco Catalyst 9000 Series switches. Describe the scalability and performance features supported by the Cisco Catalyst 9000 Series Switches. Describe the Cisco Catalyst 9000 Series Switch support for security, Quality of Service (QoS), and Internet of Things (IoT) convergence features. Describe the Cisco Catalyst 9000 Series support for cloud hosting and connectivity, along with automation features. Explore the SD-Access solution fundamentals, deployment models for the Cisco Catalyst 9000 Series Switch, and the use of Cisco DNA Center to manage infrastructure devices. The Implementing Cisco Catalyst 9000 Switches (ENC9K) v3.0 course introduces you to the architecture, capabilities, and implementation of the Cisco© Catalyst© 9000 switching platform. This hands-on course covers many features of this Cisco IOS© XE platform and describes how to manage devices from a single dashboard called Cisco DNA Center?. You will learn how to use the Cisco Catalyst 9000 family of switches to enable Software Defined Access (SD-Access) and provide end-to-end security and automation with centralized management using Cisco DNA Center. Course Outline Introducing the Cisco Catalyst 9000 Series Switches Introducing Cisco Catalyst 9200 Series Switches Introducing Cisco Catalyst 9300 Series Switches Introducing Cisco Catalyst 9400 Series Switches Introducing Cisco Catalyst 9500 Series Switches Introducing Cisco Catalyst 9600 Series Switches Positioning Cisco Catalyst 9000 Series Switches Examining the Cisco Catalyst 9000 Series Switches Management Capabilities Describing New Features on Cisco Catalyst 9000 Series Switches Describing Scale and Performance Features on Cisco Catalyst 9000 Series Switches Describing Security, QoS, and IoT Convergence Features on Cisco Catalyst 9000 Series Switches Describing Cloud and Automation Features on Cisco Catalyst 9000 Series Switches Describing Cisco SD-Access Solution and Cisco Catalyst 9000 Series Switches Additional course details: Nexus Humans Cisco Implementing Cisco Catalyst 9000 Series Switches v3.0 (ENC9K) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Implementing Cisco Catalyst 9000 Series Switches v3.0 (ENC9K) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Implementing Cisco Catalyst 9000 Series Switches v3.0 (ENC9K)
Delivered OnlineFlexible Dates
Price on Enquiry

Red Hat Virtualization (RH318)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Linux system administrators, virtualization administrators, and hybrid infrastructure engineers interested in deploying large-scale virtualization solutions and managing virtual servers in their datacenters, based on the Red Hat Virtualization open virtualization management platform. Overview Configure Red Hat Virtualization Configure networking and storage for use with Red Hat Virtualization Manage user accounts and access to the Red Hat Virtualization environment Install and manage virtual machines in Red Hat Virtualization Use templates for rapid virtual machine deployment Manage virtual machine snapshots and images Migrate virtual machines and explore high-availability options Deploy, configure, manage, and migrate virtual environments Red Hat Virtualization (RH318) teaches you the skills needed to deploy, administer, and operate virtual machines in your organization using Red Hat© Virtualization. Through numerous hands-on exercises, you will demonstrate the ability to deploy and configure the Red Hat Virtualization infrastructure and use it to provision and manage virtual machines. This offering also prepares you for the Red Hat Certified Specialist in Virtualization exam. This course is based on Red Hat Enterprise Virtualization 4.3 and Red Hat Enterprise Linux© 7.6 and 8, as well as Red Hat Hyperconverged Infrastructure for Virtualization 1.6. 1 - Red Hat Virtualization overview Explain the purpose and architecture of Red Hat Virtualization. 2 - Install and configure Red Hat Virtualization Install a minimal Red Hat Virtualization environment and use it to create a virtual machine. 3 - Create and manage datacenters and clusters Organize hypervisors into groups using datacenters and clusters. 4 - Manage user accounts and roles Configure user accounts using a central directory service, then use roles to assign access to resources based on job responsibilities. 5 - Adding physical hosts Add additional Red Hat Virtualization hosts automatically, and move and remove hosts from datacenters as needed. 6 - Scale Red Hat Virtualization infrastructure Add Red Hat Virtualization hosts automatically, configure Red Hat Enterprise Linux hosts when appropriate, and move and remove hosts from data centers as needed. 7 - Manage Red Hat Virtualization networks Separate network traffic into multiple networks on one or more interfaces to improve the performance and security of Red Hat Virtualization. 8 - Manage Red Hat Virtualization storage Create and manage data and ISO storage domains. 9 - Deploy and manage virtual machines Operate virtual machines in the Red Hat Virtualization environment. 10 - Migrate virtual machines Migrate and control automatic migration of virtual machines. 11 - Manage virtual machine images Manage virtual machine snapshots and disk images. 12 - Automating virtual machine deployment Automate deployment of virtual machines by using templates and cloud-init. 13 - Back up and upgrade Red Hat Virtualization Back up, restore, and upgrade the software in a Red Hat Virtualization environment. 14 - Explore high-availability practices Explain procedures to improve the resilience and reliability of Red Hat Virtualization by removing single points of failure and implementing high-availability features. 15 - Perform comprehensive review Demonstrate skills learned in this course by installing and configuring Red Hat Virtualization; using the platform to create and manage virtual machines; and backing up and updating components of Red Hat Virtualization. Additional course details: Nexus Humans Red Hat Virtualization (RH318) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Red Hat Virtualization (RH318) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Red Hat Virtualization (RH318)
Delivered OnlineFlexible Dates
Price on Enquiry